On 17 May, World Information Society Day, ITU together with other partners (including UNCTAD and the KADO) launched a new series of reports entitled World Information Society Report. The summary of the report is available on the website at www.itu.int/wisr. The report itself will be published in June 2006.

The partners involved have created the Digital Opportunity Index (DOI) to measure digital opportunity for 180 economies. It is a composite index created from a set of eleven internationally agreed core ICT indicators (established by the Partnership on Measurement of the Information Society). The DOI has a flexible and versatile structure, based on three categories: opportunity, infrastructure and utilization. This classification is intended to help policy-makers in determining where countries are strong and weak in order to focus attention on priority areas. The top ten economies for Digital Opportunity are shown below on the left with Korea and Japan leading the rankings. The top major gainers in the DOI during the period 2001-2005 is shown on the right with India and China leading with the most gains. The rankings of all measured economies is shown on page 17 of the World Information Society Report summary.

In a press release today, ITU announced a global opinion survey to assess trust of online transactions and awareness of cybersecurity measures. The survey was conducted by ITU in conjunction with World Telecommunication Day, celebrated on 17 May to commemorate the founding of ITU in 1865. The theme chosen this year — Promoting Global Cybersecurity — aims to highlight the serious challenges of ensuring the safety and security of networked information and communication systems.

The announcement of the results of the survey coincides with the launch of an ITU Cybersecurity Gateway portal. The portal is a global online reference source of national cybersecurity initiatives and websites around the world and provides an integrated platform for sharing cybersecurity related information and resources. Presenting information tailored to four specific audiences: citizens, businesses, governments, and international organizations, the portal also provides information resources on topical cybersecurity concerns such as spam, spyware, phishing, scams and frauds, worms and viruses, denial of service attacks, etc.

With thousands of links to relevant materials, ITU intends to constantly update the portal with information on cybersecurity initiatives and resources gathered from contributors around the globe. For example, a number of countries are now ramping up national critical information infrastructure protection (CIIP) programmes and sharing information on these initiatives through the portal can assist both developed and developing economies in promoting global cybersecurity.

These efforts highlight work being carried out as follow-up to the World Summit on the Information Society (WSIS) Action line C5 dealing with "Building confidence and security in the use of ICT", for which ITU is the facilitator/moderator.

Update: UN Secretary-General Kofi Annan has made the following statement in conjunction with World Telecommunication Day giving his perspectives on promoting global cybersecurity.

The Filipino telecoms watchdog, the National Telecommunications Commission (NTC), says it will revoke the mobile licence of any operator found guilty of breaking its guidelines on unsolicited broadcast messaging via SMS. The amended rules and regulations also require content providers – alleged to have sent out spam promos to subscribers – to register with the NTC.

This will serve as the basis of an application with the Department of Trade and Industry that grants permits to allow companies to advertise promos. Mobile phone operators and content providers risk being blacklisted if found guilty of violating the agency’s rules.

UN Press Release: The United Nations Secretary-General Kofi Annan today established an Advisory Group to assist him in convening the Internet Governance Forum, a new forum for a multi-stakeholder dialogue on Internet governance. The Group includes 46 members from Government, the private sector and civil society, including the academic and technical communities, who represent all regions of the world (see list below). It is chaired by Nitin Desai, the Secretary-General’s Special Adviser for the World Summit on the Information Society (WSIS), who may also select special advisers to assist him.

The European Commission has launched a public consultation on RFID, with a view to developing a coherent RFID Policy for Europe. In order to prepare for the consultation, the Commission is organizing a series of workshops (5) between March and June 2006, in which experts and stakeholders from all over Europe and the world come together to debate the key issues.

ITU's Lara Srivastava spoke at the first workshop (6-7 March 2006), and also at the third workshop in the series held 16-17 May 2006 on "RFID Security, Data Protection & Privacy, Health and Safety Issues" (see the presentation here). The Policy Framework Paper written by the Commission in advance of the meeting highlighted the vision of the ITU's 2006 Internet Report on "The Internet of Things" released in November 2005.

Two more workshops are planned in early June, after which the Commission will open up the debate for a wider on-line public consultation, resulting in a Communication on RFID to be issued later this year.

The ongoing evolution from packet based networks to hybrid networks in Research & Education (R&E) networks, or what are the fundamental reasons behind this fundamental paradygm shift and the resulting growing gap between commercial and R&E Internet networks?

As exemplified by the Internet2 HOPI initiative, the new GEANT2 backbone, the GLIF initiative and projects such as Dragon and Ultralight, National Research and Education Network (NREN) infrastructures are undergoing several very fundamental evolutions moving from conventional Packet based Internet networks to Hybrid networks while also moving from commercial Telecom Operator networks to Customer Empowered, dark fiber based, networks.

By hybrid networks, we mean the combination of conventional packet based Internet networks coupled with the capability to dynamically establish high speed End-to-end circuits, i.e. Bandwidth on Demand (BoD), also referred to sometimes as "lambda Grids",

This paper is attempting to explain the fundamental reasons behind this very significant paradygm shift and to assess its likely impact on National R&E, while also giving a very brief overview on what next generation Optical Transport Networks (OTN) may look like in a few years time with the advent of Ethernet over SONET/SDH (EoS), Generic Framing Procedures (GFP), Virtual Concatenation (VCAT) and Link Capacity Adjustment Scheme (LCAS).

17 May 2006 A global opinion survey to assess trust of online transactions and awareness of cybersecurity measures was conducted by ITU in conjunction with World Telecommunication Day, celebrated on 17 May to commemorate the founding of ITU in 1865. The theme chosen this year - Promoting Global Cybersecurity - aims to highlight the serious challenges of ensuring the safety and security of networked information and communication systems.

The announcement of the results of the survey coincides with the launch of an ITU Cybersecurity Gateway portal. These efforts also highlight work being carried out as follow-up to the World Summit on the Information Society (WSIS) Action line C5 dealing with "Building confidence and security in the use of ICT", for which ITU is the facilitator/moderator.

The Security Assertion Markup Language (SAML) and Extensible Access Control Markup Language (XACML) authored by OASIS (Organization for the Advancement of Structured Information Standards) have been consented as internationally recognised ITU-T Recommendations. The announcement is the first result of the formal relationship between the standardization sector of ITU and OASIS.

The standards (ITU-T Recommendations X.1141 (SAML) and X.1142 (XACML)) address the concern of how to allow safe single sign-on, a system that enables a user to authenticate once and gain access to the resources of multiple software systems. While solutions existed in this space, all were proprietary, and therefore not addressing the problem on a global level.

SAML and XACML are designed to control access to devices and applications on a network. The need for standards in this area has become more of an issue as business networks increasingly use the public Internet.

SAML addresses authentication and provides a mechanism for transferring authentication and authorization decisions between cooperating entities, XACML leverages this information to determine access to resources by focusing on the mechanism for arriving at those authorization decisions.

An additional feature of SAML is that it allows organizations to communicate information without any change to their own internal security architectures.

Geneva, 9 May 2006 — The first World Information Society Day will be commemorated on 17 May 2006 to mark the inception of the International Telecommunication Union in 1865, over 140 years ago.

On this important occasion, the first ITU World Information Society Award will be presented to two distinguished and eminent personalities whose outstanding personal contributions have furthered the cause of building a more inclusive and equitable Information Society and helped close the digital divide. The inaugural ITU Award will be given to President Abdoulaye Wade of Senegal and Professor Muhammad Yunus, Managing Director of Grameen Bank, Bangladesh.

The award ceremony will begin at 11h00 on 17 May 2006 at the International Conference Centre Geneva (CICG). There will be an opportunity after the ceremony for the laureates to meet the press.

Bandwidth in developing countries can be so expensive that some universities cannot afford speeds equivalent to the average Western household with ADSL connection. The reasons for this situation include: Internet access available only via satellite connections and lack of communications infrastructure in many remote areas. Bandwidth and computing equipment are expensive as a result of weak currencies, high transport costs, small budgets and high tariffs. Universities cannot afford a decent link, or in some cases still do not see its value or are unaware of existing alternatives. By applying optimization techniques based on Open Source technologies, effectiveness of available connections can be highly improved.

The Workshop will provide information and practical training on how to gain the maximum benefit from existing connections to the Internet, exposing participants to the latest techniques to optimise the use of low-bandwidth network connections.

The Workshop will consist of theoretical lectures, laboratory hands-on sessions and demos. Linux will be used as primary O.S. Case Studies by Participants are also welcome, describing their computing and networking environment and connectivity related problems, issues on content delivery, etc.

3 Italia has launched Walk TV, the first digital TV mobile broadcast using DVB-H technology in Europe. Programming will initially consist of channels from state broadcaster RAI, Mediaset and News Corp unit Sky Italia. And in June, the TV services will expand to include 3 Italia's own La3-branded channels, and World Cup soccer action, for which 3 Italia has bought the DVB-H Italian territory rights.

The 3 Italia DVB-H service reaches 65% of Italy's population and customers will need specific handsets to access the content.

Singapore’s mobile users – 99.8% of Singapore’s population, according to the Infocomm Development Authority’s (IDA) February 2006 stats – will have more protection against mobile spam in the future. IDA has put its foot down on this issue, warning of “swift enforcement” of penalties should mobile operators continue to fail to resolve mobile spam issues satisfactorily.

A strong warning letter was sent to SingTel, StarHub and M1, the three mobile operators in Singapore. In addition, IDA decided to make an example of errant content operator mTouche in the highly publicized mTouche spam case. Between 30th January to 5th February this year, 300,000 mobile end users were billed S$1 for unsolicited SMSes sent by mTouche through the three telcos.

China has introduced regulations that make it illegal to run an email server without a licence. The new rules, which came into force two weeks ago, mean that most companies running their own email servers in China are now breaking the law. The new email licensing clause is just a small part of a new anti-spam law formulated by China's Ministry of Information Industry (MII).

The impact on corporate email servers, which are commonly used by companies with more than a handful of employees, appears to have gone unnoticed until now. However, Singapore-based technology consultant, James Seng, who first drew attention to the new email licence requirement, believes the inclusion of the prohibition on mail servers is no accident.

A new mobile phone payment system has been launched in has been launched in the U.K. and Germany. LUUP (called LUUPAY in Germany) allows consumers to use their mobile phone like a wallet to shop with retailers or send and receive money on a person-to-person basis - with cash, debit/credit card and bank account functions built-in.

The "Survey on Industry Measures taken to comply with National Measures implementing Provisions of the Regulatory Framework for Electronic Communications relating to the Security of Services" conducted by the Technical Department of ENISA, Section Security Policies is available here.

The US Federal Communications Commission today adopted a Second Report and Order and Memorandum Opinion and Order (Order) that addresses several issues regarding implementation of the Communications Assistance for Law Enforcement Act (CALEA), enacted in 1994. Among other things, the Order affirms that the CALEA compliance deadline for facilities-based broadband Internet access and interconnected VoIP services will be May 14, 2007, as established by the First Report and Order in this proceeding. The Order concludes that this deadline gives providers of these services sufficient time to develop compliance solutions, and notes that standards developments for these services are already well underway. Further details and background are available in the FCC news release and statement by individual FCC commissioners:

ITU-T was mandated to work on IDN at the 2004 World Telecommunication Standardization Assembly in Brazil. IDN will contribute to easier and greater use of the Internet in those countries where the native or official languages are not represented in ASCII characters.

Andrzej Bartosiewicz, representing Poland and acting as Rapporteur for IDNs said: “We have received a number of contributions in this area and have been impressed with the level of interest and the productive nature of discussions. There are a number of organizations working in the field and I believe coordination will be an important focus of any work. The upcoming workshop will be a particularly useful tool for facilitating networking between experts in the field and furthering the study in general.”

Bartosiewicz said that a webpage will be published shortly with news on ITU-T study in the area, as well as related events and technical documents. An official 'circular letter' will be sent sent to Member States he said, requesting information about their experiences on the use of IDN. Given the response to this communication SG 17 will be able to better assess the current situation and needs.

"As the International Telecommunication Union (ITU) prepares to celebrate this year's World Telecommunication Day, Nigerian experts on information communications technology, mobile telecommunication firms and industry regulators will converge in Abuja to brainstorm on the strides the nation had taken in the sector over the last couple of years and take stock on the level at which the government and the citizenry have embraced the new technologies as a tool for economic and social development."

"In keeping with the theme of this year's celebration - 'Promoting Global Cybersecurity'- an international symposium has been scheduled to held (in Abuja) where issues such as internet governance, financing of ICT development and universal access to the information superhighway will be discussed."

"Experts and technocrats will also compare notes on the theories and realities of Information Communication Technology in terms of achieving the Millennium Development Goals in Nigeria. The symposium is also expected to explore avenues of strengthening bilateral and multilateral development and economic cooperation for ICT expansion in Nigeria."

Information, knowledge, and culture are central to human freedom and human development. How they are produced and exchanged in our society critically affects the way we see the state of the world as it is and might be; who decides these questions; and how we, as societies and polities, come to understand what can and ought to be done. For more than 150 years, modern complex democracies have depended in large measure on an industrial information economy for these basic functions. In the past decade and a half, we have begun to see a radical change in the organization of information production. Enabled by technological change, we are beginning to see a series of economic, social, and cultural adaptations that make possible a radical transformation of how we make the information environment we occupy as autonomous individuals, citizens, and members of cultural and social groups. It seems passé today to speak of "the Internet revolution." In some academic circles, it is positively naïve. But it should not be. The change brought about by the networked information environment is deep. It is structural. It goes to the very foundations of how liberal markets and liberal democracies have coevolved for almost two centuries.

A series of changes in the technologies, economic organization, and social practices of production in this environment has created new opportunities for how we make and exchange information, knowledge, and culture. These changes have increased the role of nonmarket and nonproprietary production, both by individuals alone and by cooperative efforts in a wide range of loosely or tightly woven collaborations. These newly emerging practices have seen remarkable success in areas as diverse as software development and investigative reporting, avant-garde video and multiplayer online games. Together, they hint at the emergence of a new information environment, one in which individuals are free to take a more active role than was possible in the industrial information economy of the twentieth century. This new freedom holds great practical promise: as a dimension of individual freedom; as a platform for better democratic participation; as a medium to foster a more critical and self-reflective culture; and, in an increasingly information dependent global economy, as a mechanism to achieve improvements in human development everywhere.

The rise of greater scope for individual and cooperative nonmarket production of information and culture, however, threatens the incumbents of the industrial information economy. At the beginning of the twenty-first century, we find ourselves in the midst of a battle over the institutional ecology of the digital environment. A wide range of laws and institutions—from broad areas like telecommunications, copyright, or international trade regulation, to minutiae like the rules for registering domain names or whether digital television receivers will be required by law to recognize a particular code—are being tugged and warped in efforts to tilt the playing field toward one way of doing things or the other. How these battles turn out over the next decade or so will likely have a significant effect on how we come to know what is going on in the world we occupy, and to what extent and in what forms we will be able—as autonomous individuals, as citizens, and as participants in cultures and communities—to affect how we and others see the world as it is and as it might be.

A new wave of spam could be on the way that tricks recipients by looking like it’s a message sent from their friends' e-mail address. This sort of spam would bypass even those filters that currently weed out 99% of the bad stuff, says John Aycock, an assistant professor of computer science at the University of Calgary.

Aycock and student Nathan Friess conducted research and wrote a paper dubbed "Spam Zombies from Outer Space" to show that generating such customized spam -- such as in the form of e-mail replies -- would not be too difficult, as has been assumed in the past. Spammers have leaned toward bulk e-mail generation that is less customized.

Since 1987, the Prix Ars Electronica has served as an interdisciplinary platform for everyone who uses ICTs as a universal medium for implementing and designing their creative projects at the interface of art, technology and society. The Prix Ars Electronica is one of the most important awards for creativity and pioneering spirit in the field of digital media.

The event calls for entries in 7 categories, including a youth competition and a grant for young creative talent:

Computer Animation / Visual Effects

Digital Music

Interactive Art

Net Vision

Digital Communities

u19 – freestyle computing

[the next idea] Art and Technology Grant

ITU's Lara Srivastava is Jury Member for the "Digital Communities" category, which focuses on the promotion of the social use of ICTs and the creation of common public goods, the sharing of knowledge, and the narrowing of the digital divide. This category was introduced to the Prix in 2004 by Jury Member Andreas Hirsch and Howard Rheingold. The other Jury members are: Steven Clift (Chairman, e-democracy.org) and Peter Kuthan (Founder, Tonga Online).

The Computer Animation Jury includes such names as Mark Dippé (Director of Spawn and Visual Effects Supervisor for Jurassic Park, The Abyss, and Terminator 2), Rick Sayre (Visual Effects Supervisor for Pixar's Toy Story, A Bug's Life and The Incredibles), and Shuzo Shiota (President and CEO of Polygon Pictures).

Results from all categories will be released during the third week in May. Awards will be handed out at the Ars Electronica Festival in September 2006. Check this blog for further news!

In a press release, the European Commission has indicated its views on follow-up to the international policy commitments made at WSIS:

To keep up the momentum of the successful World Summit on Information Society (Tunis, 16-18 November 2005), the European Commission has set out today its priorities for implementing the international policy commitments made at the Summit. These priorities include safeguarding and strengthening human rights, in particular the freedom to receive and access information. Information and communication technologies (ICTs) should be used to contribute to open democratic societies and to economic and social progress worldwide. The Commission calls for continuing international talks to improve Internet governance through the two new processes created by the Summit: the multi-stakeholder Internet Governance Forum and the mechanism of enhanced cooperation that will involve all governments on an equal footing.

We've reported more than once on cases where remote malicious users have moved away from the stealth use of infected computers (stealing data from them, using them as part of zombie networks etc) to direct blackmail, demanding payment from victims. At the moment, this method is used in two main ways: encrypting user data and corrupting system information.

Users quickly understand that something has happened to their data. They are then told that they should send a specific sum to an e-payment account maintained by the remote malicious user, whether it be EGold, Webmoney or whatever. The ransom demanded varies significantly depending on the amount of money available to the victim. We know of cases where the malicious users have demanded $50, and of cases where they have demanded more than $2,000. The first such blackmail case was in 1989, and now this method is again gaining in popularity.

In 2005, the most striking examples of this type of cybercrime were carried out using the Trojans GpCode and Krotten. The first of these encrypts user data; the second restricts itself to making a number of modifications to the victim machine's system registry, causing it to cease functioning.

The OECD has released its end-2005 broadband statistics for 30 OECD member countries. According to the OECD, main highlights from the second half of 2005 are:

In December 2005, four countries (Iceland, Korea, the Netherlands and Denmark) led the OECD in broadband penetration, each with more than 25 subscribers per 100 inhabitants.

Iceland now leads the OECD with a broadband penetration rate of 26.7 subscribers per 100 inhabitants.

Korea’s broadband market is advancing to the next stage of development where existing subscribers switch platforms for increased bandwidth. In Korea, fibre-based broadband connections grew 52.4% during 2005. This switchover effect is evident by the net loss of DSL (-3.3%) and cable (-1.7%) subscribers during the year.

The strongest per-capita subscriber growth came from Iceland, Finland, Norway, the Netherlands and Australia. Each country added more than 6 subscribers per 100 inhabitants during 2005.

Japan leads the OECD in fibre-to-the-premises (FTTP) with 4.6 million fibre subscribers at the end of 2005. Fibre subscribers alone in Japan outnumber total broadband subscribers in 21 of the 30 OECD countries.

DSL is still the leading platform in 28 OECD countries. Cable subscribers outnumber DSL in Canada and the United States.

The United States has the largest total number of broadband subscribers in the OECD at 49 million. US broadband subscribers represent 31% of all broadband connections in the OECD.

Canada leads the G7 group of industrialized countries in broadband penetration

Looking back, 2005 saw a rise in profit-driven attacks. These were reflected by phishing, which now represents as much as one percent of the global e-mail traffic and is far more effective than spamming.

Viruses, worms, and malicious software are becoming part and parcel of information and communications technology. According to Trend Micro's report, called Virus and Spam Roundup 2005 and Predictions for 2006, this year will see more spy phishing and spear phishing on the Internet.

Though the United States is making progress in the war on unsolicited commercial e-mail, or spam, it still generates more than any other nation in the world, according to recent statistics from Sophos, a provider of anti-malware solutions.

Sophos ranked spam outputs of the top 12 countries and top six continents based on messages it received in its “global network of spam traps” between January and March, according to the group’s release.

The information presented within this blog comes from various organizations around the world. ITU encourages users to seek more detailed information from the original source through the links provided.
Links to third-party websites are provided for the convenience of all users. The ITU is not responsible for the accuracy, currency or the reliability of the content on these third-party websites. ITU does not offer any guarantee in that regard nor does ITU endorse the third-party organizations, their sites or content.